Vulnerability Details : CVE-2002-0986
The mail function in PHP 4.x to 4.2.2 does not filter ASCII control characters from its arguments, which could allow remote attackers to modify mail message content, including mail headers, and possibly use PHP as a "spam proxy."
Products affected by CVE-2002-0986
- cpe:2.3:a:php:php:4.0:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:4.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:4.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:4.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:4.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:4.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:4.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:4.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:4.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:4.0.1:patch2:*:*:*:*:*:*
- cpe:2.3:a:php:php:4.0.1:patch1:*:*:*:*:*:*
- cpe:2.3:a:php:php:4.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:3.0.18:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:4.0.3:patch1:*:*:*:*:*:*
- cpe:2.3:a:php:php:4.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:4.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:4.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:4.2.2:*:*:*:*:*:*:*
Threat overview for CVE-2002-0986
Top countries where our scanners detected CVE-2002-0986
Top open port discovered on systems with this issue
80
IPs affected by CVE-2002-0986 981
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2002-0986!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2002-0986
2.83%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 89 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2002-0986
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:N |
10.0
|
2.9
|
NIST |
References for CVE-2002-0986
-
http://www.debian.org/security/2002/dsa-168
Debian -- The Universal Operating System
-
http://www.kb.cert.org/vuls/id/410609
US Government Resource
-
http://marc.info/?l=bugtraq&m=105760591228031&w=2
'[OpenPKG-SA-2003.032] OpenPKG Security Advisory (php)' - MARC
-
http://www.redhat.com/support/errata/RHSA-2002-244.html
Support
-
http://www.redhat.com/support/errata/RHSA-2002-213.html
Support
-
http://www.redhat.com/support/errata/RHSA-2002-248.html
Support
-
http://marc.info/?l=bugtraq&m=103011916928204&w=2
'PHP: Bypass safe_mode and inject ASCII control chars with mail()' - MARC
-
http://www.redhat.com/support/errata/RHSA-2003-159.html
Support
-
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000545
CONECTIVA | AnĂ¡lises dos Melhores Produtos Online (#10 Melhores)
-
http://www.redhat.com/support/errata/RHSA-2002-243.html
Support
-
http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:082
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/9959
-
http://www.securityfocus.com/bid/5562
Patch;Vendor Advisory
-
ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-008.0.txt
-
http://www.redhat.com/support/errata/RHSA-2002-214.html
Support
-
http://www.novell.com/linux/security/advisories/2002_036_modphp4.html
404 Page Not Found | SUSE
Jump to